Analysis

  • max time kernel
    66s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    10/02/2023, 19:06

General

  • Target

    purchase order.exe

  • Size

    955KB

  • MD5

    83027ceebd07df0f927f780be4dbc729

  • SHA1

    acbc3142cac50ab28474f5c8945585e2c07ba81d

  • SHA256

    66fcc078741968b04e45e850256bcf6f64506fd143a5b9ebf31b5244d423e277

  • SHA512

    c7516c61db56217fa75817f93242ecd5c1add40a59d8cda221f51d6199e11817bc31c8cc808cde3377aa1df1266a6ad36f5022a21163ae4d1d39ece4e18ff2ee

  • SSDEEP

    24576:4p1/YGDkjwJsoGlWM9STNNS/GoqMUwwhvgoK3:4ptY5UsoGlxZ/GotU/v

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5615947415:AAHTRsWQ236jQ31p3gNngAMLROoKsqd6tPs/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\purchase order.exe
    "C:\Users\Admin\AppData\Local\Temp\purchase order.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\purchase order.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:568
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\hUkqfyOvIRph.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1748
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hUkqfyOvIRph" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC66C.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1844
    • C:\Users\Admin\AppData\Local\Temp\purchase order.exe
      "C:\Users\Admin\AppData\Local\Temp\purchase order.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:1768

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmpC66C.tmp

          Filesize

          1KB

          MD5

          e1c27a868a873b8ed429b126cdfaec6b

          SHA1

          05b7ef0acdb57be9c20cddeeabac2ed2f8dc0869

          SHA256

          beb7759728586a89a9becefa541d49a73847ecbb0f9588c4365d22644bf1b37d

          SHA512

          9de020fc0aa7d4432ff52c73a366166b74c4965356aca50672beeff05bde6c07352e132b241881096e744f172ea66cbc347224ece7781b50b8ac1f0a79869f1f

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          017d9f4c5126dd734cb26884a2e659a9

          SHA1

          b1b59368e5f73c7fcb3a4349cd8c844b239c02ee

          SHA256

          777014fc8dc392d2bea7e470308becfe6e57716ab3d74dfdfae3e3ae2d7a8c9f

          SHA512

          90209401b4d37ab08521f3eeebe083f9dc2b63721bdfe5433ff01757d8b3c46e1dbbe8c34888d1596c4c2fee283c5f1e799fac857289bafa2f579d1c67367095

        • memory/568-80-0x000000006ECC0000-0x000000006F26B000-memory.dmp

          Filesize

          5.7MB

        • memory/1708-66-0x00000000045D0000-0x0000000004602000-memory.dmp

          Filesize

          200KB

        • memory/1708-58-0x0000000005600000-0x000000000568C000-memory.dmp

          Filesize

          560KB

        • memory/1708-57-0x0000000000410000-0x000000000041C000-memory.dmp

          Filesize

          48KB

        • memory/1708-56-0x00000000002C0000-0x00000000002D4000-memory.dmp

          Filesize

          80KB

        • memory/1708-54-0x0000000001070000-0x0000000001166000-memory.dmp

          Filesize

          984KB

        • memory/1708-55-0x0000000075711000-0x0000000075713000-memory.dmp

          Filesize

          8KB

        • memory/1748-79-0x000000006ECC0000-0x000000006F26B000-memory.dmp

          Filesize

          5.7MB

        • memory/1768-70-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/1768-68-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/1768-71-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/1768-72-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/1768-77-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/1768-75-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/1768-67-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB